Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review

MS Yousefpoor, E Yousefpoor, H Barati, A Barati… - Journal of Network and …, 2021 - Elsevier
Wireless sensor networks include a large number of sensor nodes, which monitor an
environment. These networks have many applications in Internet of Things (IoT) and …

[HTML][HTML] A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks

KY Tsao, T Girdler, VG Vassilakis - Ad Hoc Networks, 2022 - Elsevier
Unmanned aerial vehicles (UAVs) are a rapidly evolving technology, and being highly
mobile, UAV systems are able to cooperate with each other to accomplish a wide range of …

Comprehensive systematic review of intelligent approaches in UAV-based intrusion detection, blockchain, and network security

AB Mohammed, LC Fourati, AM Fakhrudeen - Computer Networks, 2023 - Elsevier
Abstract Unmanned Aerial Vehicles (UAVs) have evolved into a pivotal component of
electronic devices deployed across a diverse array of sectors and industries in recent years …

A survey on the current security landscape of intelligent transportation systems

A Lamssaggad, N Benamar, AS Hafid, M Msahli - IEEE Access, 2021 - ieeexplore.ieee.org
With the proliferation of embedded technologies and wireless capabilities, today's vehicles
are no longer isolated mechanical machines. They become part of a hyper-connected …

Classification of cyber security threats on mobile devices and applications

MA Almaiah, A Al-Zahrani, O Almomani… - Artificial intelligence and …, 2021 - Springer
Mobile devices and applications are prone to different kinds of cyber threats and attacks that
affect their users' privacy. Therefore, there is critical need to understand all cyber threats …

Location privacy-preserving task recommendation with geometric range query in mobile crowdsensing

C Zhang, L Zhu, C Xu, J Ni, C Huang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In mobile crowdsensing, location-based task recommendation requires each data requester
to submit a task-related geometric range to crowdsensing service providers such that they …

Lightweight Sybil attack detection in IoT based on bloom filter and physical unclonable function

C Pu, KKR Choo - computers & security, 2022 - Elsevier
Routing protocols play an important role in the communication and information distribution
within an Internet of Things (IoT) system. RPL is one such popular routing protocol for IoT …

Sybil attack in RPL-based internet of things: analysis and defenses

C Pu - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Over the past few years, Internet of Things (IoT) has emerged as a promising paradigm that
connects various physical devices to the Internet, and contributes to the development of …

Toward trusted and swift UAV communication: ISAC-enabled dual identity mapping

Y Cui, Z Feng, Q Zhang, Z Wei, C Xu… - IEEE Wireless …, 2023 - ieeexplore.ieee.org
The UAV network has recently emerged as a capable carrier for ubiquitous wireless
intelligent communication in the B5G/6G era. Nevertheless, the separation of dual identity …

Particle-water wave optimization for secure routing in wireless sensor network using cluster head selection

PS Khot, U Naik - Wireless Personal Communications, 2021 - Springer
Wireless sensor network (WSN) has some great advantages, such as flexible
communication, low power consumption, and low cost. In view of the WSN clustering …